PPT - University Faculty

advertisement
University of Central Arkansas
CSCI 3335: COMPUTER NETWORKS
Vamsi Paruchuri
Assistant Professor
Department of Computer Science
1
Textbook and Resources
 Textbook:
James F. Kurose and Keith W. Ross, Computer
Networking: A Top-down Approach, Addison-Wesley.
 References:
 Andrew S. Tanenbaum, David J. Wetherall, "Computer
Networks" (5th Edition), ISBN-10: 0132126958, Publisher:
Prentice Hall
 W. Richard Stevens, UNIX Network Programming, Volume 1:
Networking APIs - Sockets and XTI, Prentice Hall, 1998, ISBN:
0-13-490012-X.
2
CSCI 3335, Fall 2010
Description
 Description:
This course covers layered networking protocols
with an emphasis on common Internet protocols
such as TCP, IP, HTTP, and SMTP. It also covers
local area networking, focusing on link layer
standards such as the IEEE standards for Ethernet
and wireless. Additional topics such as security
and congestion control will also be covered.
 Prerequisite: CSCI 2320 or consent of instructor.
3
CSCI 3335, Fall 2010
Course Objectives
 In
this
course,
we
will
study
computer
communication and networking systems in a
broad sense. We will discuss topics ranging from
the
transmission
communication
of
media
data
to
across
physical
contemporary
distributed computing environments; from the
low
level
data
transmission
to
high
level
application software.
CSCI 3335, Fall 2010
4
Course Objectives (Cont.)
 Expose students to important Internet protocols at
each layer of the protocol stack
 Provide hands-on experience with analyzing traces
of network protocols in action
 Give students an appreciation for the Internet
standards process and the way in which protocols
are evolve
 Challenge students to think critically about
problems in the Internet
CSCI 3335, Fall 2010
5
Course Outcomes
 Students will be able to find and understand online
documentation of Internet protocols
 Students will be able to examine and explain traces
of actual network traffic
 Students will understand the network protocol stack
both in the abstract and as it is realized in the
Internet
 Students will appreciate the security implications of
common networking applications and protocols
 Students will be able to write a networking
application using sockets
CSCI 3335, Fall 2010
6
Course Evaluation
Homework / Projects
50%
Midterm / Final
40%
Class Participation
10%
Some Projects and Lab assignments are based on Wireshark
(aka Ethereal) – a network analyzer. It works by reading
network packets, decoding them, and presenting them in an
easy to understand format. It is open source software and can
be used by network professionals for s troubleshooting,
analysis, and protocol development.
CSCI 3335, Fall 2010
7
Course Policies
 Late submissions are not acceptable as solutions would be
discussed on the due date. Exams are to be taken at the specified
date and time. If there are circumstances that prevent you from
meeting your obligations for this course, you need to talk to me to
make arrangements IN ADVANCE.
 Attendance of every class is mandatory.
 Statement on Academic dishonesty/plagiarism: Academic
misconduct is defined in the section of Academic Policies in your
Student Handbook. Student who engaged in such misconduct will
be penalized. You are encouraged to familiarize with all policies
listed in the Student Handbook.
 Other Policies: Absolutely no usage of Laptops, Cellular Devices
in class. Talking and other activities that distract/disturb others in
the class would not be tolerated.
CSCI 3335
8
Download